Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
A
A1
AC
ACD
ACK
ACL
ACU
A-D
Ada
ADC
ADH
ADM
ADP
AE
AES
AFJ
AFR
AI
AIG
AIN
AIS
AJ
AK
AKM
ALC
ALE
ALU
AMA
AMI
AMS
ANI
AOS
AP
APC
APD
APL
App
APU
AR
Arg
ARQ
ARS
ASU
AV
AVP
Access Control Models
  • DAC controls on the ability to assign access permission to an object by a user already possessing access permission. The ability to assign these permissions should be controlled with the same precision as the ability to access the objects themselves. (NCSC-TG-028 ver 1).
  • A model that gives rules of operation showing how access decisions are made. Traditionally, an access control model involves a set of states together with a set of primitive operations on states whose behavior is defined by rules of operation. Typically, each state contains a set of S of "SUBJECTS," a set O of "objects," and an access matrix A. For each subject s and object o, A[s,o] is a set of access rights, such as read, write, execute, and own. (NCSC-TG-010 ver 1).
  • A model which relates subjects, objects and access types.